
CVE-2022-24903 – Buffer overflow in TCP syslog server (receiver) components in rsyslog
https://notcve.org/view.php?id=CVE-2022-24903
05 May 2022 — Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. • https://github.com/rsyslog/rsyslog/commit/f211042ecbb472f9d8beb4678a65d272b6f07705 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write CWE-1284: Improper Validation of Specified Quantity in Input •

CVE-2011-1490
https://notcve.org/view.php?id=CVE-2011-1490
14 Nov 2019 — A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset Se encontró una pérdida de memoria en rsyslog versiones anteriores a la versión 5.7.6, en la manera en que son registrados los mensajes de log procesados ??en el demonio cuando se ... • http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html • CWE-772: Missing Release of Resource after Effective Lifetime •

CVE-2011-1489
https://notcve.org/view.php?id=CVE-2011-1489
14 Nov 2019 — A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset. Se encontró una pérdida de memoria en rsyslog versiones anteriores a la versión 5.7.6, en la manera en que son registrados los mensajes de log procesados ??en el demonio cuando m... • http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html • CWE-772: Missing Release of Resource after Effective Lifetime •

CVE-2011-1488
https://notcve.org/view.php?id=CVE-2011-1488
14 Nov 2019 — A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent within short periods of time. Se encontró una pérdida de memoria en rsyslog versiones anteriores a la versión 5.7.6, en la manera en que son registrados los mensajes de log procesados ??en el demonio cuando $RepeatedM... • http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html • CWE-772: Missing Release of Resource after Effective Lifetime •

CVE-2019-17042 – rsyslog: heap-based overflow in contrib/pmcisconames/pmcisconames.c
https://notcve.org/view.php?id=CVE-2019-17042
07 Oct 2019 — An issue was discovered in Rsyslog v8.1908.0. contrib/pmcisconames/pmcisconames.c has a heap overflow in the parser for Cisco log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon), but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat u... • http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html • CWE-20: Improper Input Validation CWE-122: Heap-based Buffer Overflow •

CVE-2019-17041 – rsyslog: heap-based overflow in contrib/pmaixforwardedfrom/pmaixforwardedfrom.c
https://notcve.org/view.php?id=CVE-2019-17041
07 Oct 2019 — An issue was discovered in Rsyslog v8.1908.0. contrib/pmaixforwardedfrom/pmaixforwardedfrom.c has a heap overflow in the parser for AIX log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon) but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser w... • https://github.com/Resery/CVE-2019-17041 • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVE-2019-17040
https://notcve.org/view.php?id=CVE-2019-17040
30 Sep 2019 — contrib/pmdb2diag/pmdb2diag.c in Rsyslog v8.1908.0 allows out-of-bounds access because the level length is mishandled. El archivo contrib/pmdb2diag/pmdb2diag.c en Rsyslog versión v8.1908.0, permite el acceso fuera de límites porque la longitud del nivel se maneja inapropiadamente. • https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog • CWE-125: Out-of-bounds Read •

CVE-2018-16881 – rsyslog: imptcp: integer overflow when Octet-Counted TCP Framing is enabled
https://notcve.org/view.php?id=CVE-2018-16881
25 Jan 2019 — A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable. Se ha detectado una vulnerabilidad de denegación de servicio (DoS) en rsyslog en el módulo imptcp. Un atacante podría enviar un mensaje especialmente manipulado al socket imptcp, lo que conduciría al cierre forzado de rsyslog. • https://access.redhat.com/errata/RHBA-2019:2501 • CWE-190: Integer Overflow or Wraparound •

CVE-2017-12588
https://notcve.org/view.php?id=CVE-2017-12588
06 Aug 2017 — The zmq3 input and output modules in rsyslog before 8.28.0 interpreted description fields as format strings, possibly allowing a format string attack with unspecified impact. Los módulos de entrada y salida de zmq3 en versiones de rsyslog anteriores a 8.28.0 interpretaban campos de descripción como cadenas de formato, lo que podía dar lugar a un ataque de tipo “format string” y causar un impacto no especificado. • https://github.com/rsyslog/rsyslog/blob/master/ChangeLog • CWE-134: Use of Externally-Controlled Format String •

CVE-2015-3243
https://notcve.org/view.php?id=CVE-2015-3243
25 Jul 2017 — rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron. rsyslog utiliza permisos débiles para generar archivos de registro, lo que permite a los usuarios locales obtener información confidencial mediante la lectura de archivos en /var/log/cron. • http://www.openwall.com/lists/oss-security/2015/06/18/12 • CWE-532: Insertion of Sensitive Information into Log File •